Re: Verify with RSA Public Key Fails

2010-03-01 Thread Paul Suhler
] On Behalf Of Paul Suhler Sent: Saturday, February 27, 2010 6:17 AM To: openssl-users@openssl.org; openssl-users@openssl.org Subject: RE: Verify with RSA Public Key Fails Hi, Mounir. I misspoke. The value of the public exponent is in fact 3. Any idea what is the purpose of the padding check

Re: Verify with RSA Public Key Fails

2010-03-01 Thread Dr. Stephen Henson
On Mon, Mar 01, 2010, Paul Suhler wrote: Does anyone else have any speculation on why I'm failing the padding check? I'm definitely using the public exponent and public modulus from the CAVP sample request file. After conversion to BIGNUMs, the bytes in the d, top, and dmax fields of each

Re: Verify with RSA Public Key Fails

2010-02-27 Thread Mounir IDRASSI
Hi Paul, You say that the exponent is 1024 bit long. This means you are using the private exponent because usually the public exponent is much smaller: typically the public exponent is 3 or 65537. So in order to construct your RSA public key, replace the value of the private exponent you are

RE: Verify with RSA Public Key Fails

2010-02-27 Thread Paul Suhler
-users@openssl.org Subject: Re: Verify with RSA Public Key Fails Hi Paul, You say that the exponent is 1024 bit long. This means you are using the private exponent because usually the public exponent is much smaller: typically the public exponent is 3 or 65537. So in order to construct your RSA

Verify with RSA Public Key Fails

2010-02-26 Thread Paul Suhler
Hi, everyone. In Openssl 0.9.8i, I'm trying to take an RSA public exponent and public modulus, assemble them into an RSA key, and use that to verify a signature for a message. However, EVP_VerifyFinal() always fails, apparently because of the wrong use of padding. My code: RSA *